Skip to content

Commit 20274db

Browse files
authored
Merge pull request #198959 from bwren/data-platform
Data platform
2 parents 327852c + 150b11e commit 20274db

File tree

123 files changed

+1137
-868
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

123 files changed

+1137
-868
lines changed

.openpublishing.redirection.azure-monitor.json

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -365,6 +365,46 @@
365365
"source_path_from_root": "/articles/azure-monitor/insights/redis-cache-insights-overview.md" ,
366366
"redirect_url": "/azure/azure-cache-for-redis/redis-cache-insights-overview",
367367
"redirect_document_id": false
368+
},
369+
{
370+
"source_path_from_root": "/articles/azure-monitor/logs/ingestion-time-transformations.md" ,
371+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations",
372+
"redirect_document_id": false
373+
},
374+
{
375+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations.md" ,
376+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-portal",
377+
"redirect_document_id": false
378+
},
379+
{
380+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-ingestion-time-transformations-api.md" ,
381+
"redirect_url": "/azure/azure-monitor/logs/tutorial-workspace-transformations-api",
382+
"redirect_document_id": false
383+
},
384+
{
385+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs.md" ,
386+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-portal",
387+
"redirect_document_id": false
388+
},
389+
{
390+
"source_path_from_root": "/articles/azure-monitor/logs/tutorial-custom-logs-api.md" ,
391+
"redirect_url": "/azure/azure-monitor/logs/tutorial-logs-ingestion-api",
392+
"redirect_document_id": false
393+
},
394+
{
395+
"source_path_from_root": "/articles/azure-monitor/agents/data-sources.md" ,
396+
"redirect_url": "/azure/azure-monitor/essentials/data-sources",
397+
"redirect_document_id": false
398+
},
399+
{
400+
"source_path_from_root": "/articles/azure-monitor/essentials/data-collection-rule-transformations.md" ,
401+
"redirect_url": "/azure/azure-monitor/essentials/data-collection-transformations-structure",
402+
"redirect_document_id": false
403+
},
404+
{
405+
"source_path_from_root": "/articles/azure-monitor/logs/custom-logs-overview.md" ,
406+
"redirect_url": "/azure/azure-monitor/logs/logs-ingestion-api-overview",
407+
"redirect_document_id": false
368408
}
369409
]
370410
}

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 22 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -4,83 +4,43 @@ description: Use data collection endpoints to uniquely configure ingestion setti
44
ms.topic: conceptual
55
author: shseth
66
ms.author: shseth
7-
ms.date: 3/16/2022
7+
ms.date: 06/06/2022
88
ms.custom: references_region
99
ms.reviewer: shseth
1010

1111
---
1212

13-
# Using data collection endpoints with Azure Monitor agent
14-
[Data Collection Endpoints (DCEs)](../essentials/data-collection-endpoint-overview.md) allow you to uniquely configure ingestion settings for your machines, giving you greater control over your networking requirements.
13+
# Enable network isolation for the Azure Monitor Agent
14+
By default, Azure Monitor agent will connect to a public endpoint to connect to your Azure Monitor environment. You can enable network isolation for your agents by creating [data collection endpoints](../essentials/data-collection-endpoint-overview.md) and adding them to your [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources).
15+
1516

1617
## Create data collection endpoint
17-
See [Data collection endpoints in Azure Monitor](../essentials/data-collection-endpoint-overview.md) for details on data collection endpoints and how to create them.
18+
To use network isolation, you must create a data collection endpoint for each of your regions for agents to connect instead of the public endpoint. See [Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-data-collection-endpoint) for details on create a DCE. An agent can only connect to a DCE in the same region. If you have agents in multiple regions, then you must create a DCE in each one.
1819

19-
## Create endpoint association in Azure portal
20-
Use **Data collection rules** in the portal to associate endpoints with a resource (e.g. a virtual machine) or a set of resources. Create a new rule or open an existing rule. In the **Resources** tab, click on the **Data collection endpoint** drop-down to associate an existing endpoint for your resource in the same region (or select multiple resources in the same region to bulk-assign an endpoint for them). Doing this creates an association per resource which links the endpoint to the resource. The Azure Monitor agent running on these resources will now start using the endpoint instead for uploading data to Azure Monitor.
2120

22-
[![Data Collection Rule virtual machines](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png)](../agents/media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)
21+
## Create private link
22+
With [Azure Private Link](../../private-link/private-link-overview.md), you can securely link Azure platform as a service (PaaS) resources to your virtual network by using private endpoints. An Azure Monitor Private Link connects a private endpoint to a set of Azure Monitor resources, defining the boundaries of your monitoring network. That set is called an Azure Monitor Private Link Scope (AMPLS). See [Configure your Private Link](../logs/private-link-configure.md) for details on creating and configuring your AMPLS.
2323

24+
## Add DCE to AMPLS
25+
Add the data collection endpoints to a new or existing [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This adds the DCE endpoints to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this from either the AMPLS resource or from within an existing DCE resource's 'Network Isolation' tab.
2426

2527
> [!NOTE]
26-
> The data collection endpoint should be created in the **same region** where your virtual machines exist.
28+
> Other Azure Monitor resources like the Log Analytics workspace(s) configured in your data collection rules that you wish to send data to, must be part of this same AMPLS resource.
29+
30+
31+
For your data collection endpoint(s), ensure **Accept access from public networks not connected through a Private Link Scope** option is set to **No** under the 'Network Isolation' tab of your endpoint resource in Azure portal, as shown below. This ensures that public internet access is disabled, and network communication only happen via private links.
32+
33+
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" lightbox="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" alt-text="Screenshot for configuring data collection endpoint network isolation.":::
34+
35+
36+
37+
Associate the data collection endpoints to the target resources by editing the data collection rule in Azure portal. From the **Resources** tab, select **Enable Data Collection Endpoints** and select a DCE for each virtual machine. See [Configure data collection for the Azure Monitor agent](../agents/data-collection-rule-azure-monitor-agent.md).
38+
39+
40+
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" lightbox="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" alt-text="Screenshot for configuring data collection endpoint for an agent.":::
2741

2842

29-
## Create endpoint and association using REST API
3043

31-
> [!NOTE]
32-
> The data collection endpoint should be created in the **same region** where your virtual machines exist.
33-
34-
1. Create data collection endpoint(s) using these [DCE REST APIs](/cli/azure/monitor/data-collection/endpoint).
35-
2. Create association(s) to link the endpoint(s) to your target machines or resources, using these [DCRA REST APIs](/rest/api/monitor/datacollectionruleassociations/create#examples).
36-
37-
38-
## Sample data collection endpoint
39-
The sample data collection endpoint below is for virtual machines with Azure Monitor agent, with public network access disabled so that agent only uses private links to communicate and send data to Azure Monitor/Log Analytics.
40-
41-
```json
42-
{
43-
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Insights/dataCollectionEndpoints/myCollectionEndpoint",
44-
"name": "myCollectionEndpoint",
45-
"type": "Microsoft.Insights/dataCollectionEndpoints",
46-
"location": "eastus",
47-
"tags": {
48-
"tag1": "A",
49-
"tag2": "B"
50-
},
51-
"properties": {
52-
"configurationAccess": {
53-
"endpoint": "https://mycollectionendpoint-abcd.eastus-1.control.monitor.azure.com"
54-
},
55-
"logsIngestion": {
56-
"endpoint": "https://mycollectionendpoint-abcd.eastus-1.ingest.monitor.azure.com"
57-
},
58-
"networkAcls": {
59-
"publicNetworkAccess": "Disabled"
60-
}
61-
},
62-
"systemData": {
63-
"createdBy": "user1",
64-
"createdByType": "User",
65-
"createdAt": "yyyy-mm-ddThh:mm:ss.sssssssZ",
66-
"lastModifiedBy": "user2",
67-
"lastModifiedByType": "User",
68-
"lastModifiedAt": "yyyy-mm-ddThh:mm:ss.sssssssZ"
69-
},
70-
"etag": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
71-
}
72-
```
73-
74-
## Enable network isolation for the Azure Monitor Agent
75-
You can use data collection endpoints to enable the Azure Monitor agent to communicate to the internet via private links. To do so, you must:
76-
1. Create data collection endpoint(s), at least one per region, as shown above
77-
2. Add the data collection endpoints to a new or existing [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This adds the DCE endpoints to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this from either the AMPLS resource or from within an existing DCE resource's 'Network Isolation' tab.
78-
> [!NOTE]
79-
> Other Azure Monitor resources like the Log Analytics workspace(s) configured in your data collection rules that you wish to send data to, must be part of this same AMPLS resource.
80-
3. For your data collection endpoint(s), ensure **Accept access from public networks not connected through a Private Link Scope** option is set to **No** under the 'Network Isolation' tab of your endpoint resource in Azure portal, as shown below. This ensures that public internet access is disabled, and network communication only happen via private links.
81-
4. Associate the data collection endpoints to the target resources, using the data collection rules experience in Azure portal. This results in the agent using the configured the data collection endpoint(s) for network communications. See [Configure data collection for the Azure Monitor agent](../agents/data-collection-rule-azure-monitor-agent.md).
82-
83-
![Data collection endpoint network isolation](media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png)
8444

8545
## Next steps
8646
- [Associate endpoint to machines](../agents/data-collection-rule-azure-monitor-agent.md#create-data-collection-rule-and-association)

0 commit comments

Comments
 (0)